Home

A critical vulnerability was found in the Android OS in which opening a cute or innocent photo in .PNG format could compromise the Android device. The vulnerability was noted in the Google’s Android security update advisory for February. The attackers can activate the bug by sending a crafted, malicious Portable Network Graphic (.PNG) file to...

Many times, you must have sent a message in Facebook Messenger accidentally to a wrong person or group or sent some message or photo for which you regret later for sending it. In those cases, nothing could have been done one such messages are sent. But now, the happy news is that there is a...

Two most popular free, open source office software LibreOffice and Apache OpenOffice have been found to have severe remote code execution (RCE) vulnerability which could be activated by just opening a malicious Open Document Text file. These software are being used by millions of Windows, MacOS and Linux users and the vulnerabilities have been disclosed...

A new backdoor trojan which has been named as “SpeakUp”was found exploiting the Linux servers that hosts more than 90% of the top 1 million domains in the U.S. The trojan uses several complicated tricks to infect hosts and to propagate. The researchers claim that this could be composed for a major offensive that affects...

Last year a 20-year-old ethical hacker had been arrested by the Hungarian police for exploiting serious vulnerabilities in Magyar Telekom which is the largest telecommunication company in the country. The hacker is subjected to face up to 8 years in prison. The Hungarian media states that the hacker discovered a severe flaw in the Telekom...

A 20-year-old college student has been convicted for stealing millions of cryptocurrencies by using the “SIM swapping” technique. The accused, Joel Ortiz of Boston pleaded guilty of the crime and accepted the appeal for stealing more than $5 million in cryptocurrency from around 40 victims. He was sentenced to 10 years in prison. Ortiz stole...

There are apps available in Google Play Store that might not be a legitimate one. Google has taken several efforts to remove fake and malicious apps, but still there are few which have managed to sneak into the Play Store. The cyber security firm, Trend Micro have discovered around 29 photo apps that are available...

A new malware has been discovered in Mac which targets to steal the contents in cryptocurrency wallets. The malware has been named as CookieMiner due to its capability to steal browser cookies associated with cryptocurrency exchanges and wallet service websites visited by the victim. The malware has been discovered by the researchers at Palo Alto...

The tech giant Facebook has been found paying teenagers an amount of $20 per month to use their VPN app which forcefully observes their smartphone and internet activity and then send the details to Facebook. Facebook is doing more than just collecting the data of its users and they are doing it at least since...

Airbus, the aerospace corporation headquartered at European Union revealed that they have been affected by a data breach which affected its commercial aircraft manufacturing business. As a result of the data breach there was unauthorized access to their employee’s data. Airbus stated that the credentials of the employees have been impacted, accessing mostly the professional...